• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Blockchain-Based Secured IPFS-Enable Event Storage Technique With Authentication Protocol in VANET

    2021-11-07 02:22:58SanjeevKumarDwivediRuhulAminandSatyanarayanaVollala
    IEEE/CAA Journal of Automatica Sinica 2021年12期

    Sanjeev Kumar Dwivedi,Ruhul Amin,and Satyanarayana Vollala

    Abstract—In recent decades,intelligent transportation systems(ITS) have improved drivers’ safety and have shared information(such as traffic congestion and accidents) in a very efficient way.However,the privacy of vehicles and the security of event information is a major concern.The problem of secure sharing of event information without compromising the trusted third party(TTP) and data storage is the main issue in ITS.Blockchain technologies can resolve this problem.A work has been published on blockchain-based protocol for secure sharing of events and authentication of vehicles.This protocol addresses the issue of the safe storing of event information.However,authentication of vehicles solely depends on the cloud server.As a result,their scheme utilizes the notion of partially decentralized architecture.This paper proposes a novel decentralized architecture for the vehicular ad-hoc network (VANET) without the cloud server.This work also presents a protocol for securing event information and vehicle authentication using the blockchain mechanism.In this protocol,the registered user accesses the event information securely from the interplanetary file system (IPFS).We incorporate the IPFS,along with blockchain,to store the information in a fully distributed manner.The proposed protocol is compared with the state-of-the-art.The comparison provides desirable security at a reasonable cost.The evaluation of the proposed smart contract in terms of cost (GAS) is also discussed.

    I.INTRODUCTION

    THE vision of Industry 4.0 is the digital transformation of industries based on innovative technologies such as cloud and cognitive computing,internet-of-things (IoT),blockchain,machine learning,etc.Industry 4.0 can provide more automation than the previous industrial revolution,and it bridges the gap between the physical and digital world.It helps to develop smart products and create a good ecosystem for them.Presently,various researchers and developers have put their efforts into developing intelligent systems.More smart devices evolve with the introduction of IoT devices,and these smart devices provide a foundation for the smart transportation system (STS).The security and safety of the drivers and efficiency of the transportation system are the main goals behind the STS.An intelligent vehicle equips with devices such as an on-board unit (OBU) and sensors that collect information and sends it to the nearby roadside units(RS Us) and cloud servers in this system.Traditionally,a transportation system employs a centralized architecture where a trusted third party such as a cloud server stores the required information.The single-point-of-failure (SPoF) and the trust issue are the two significant problems associated with this architecture.Moreover,the number of intelligent vehicles and users is increasing.As a result,the present system and the communication protocols cannot provide sufficient response to the system’s requirement [1].

    Researchers utilize the distributed network architecture instead of a centralized architecture to provide trust and fairness in the system.Blockchain is a new distributed system,and Satoshi Nakamoto first implemented the underlying concept of blockchain in the famous bitcoin cryptocurrency[2].Blockchain technology combines the ledger and consensus concept with peer-to-peer networking and security properties.Its architecture generally consists of six layers starting from the data layer (block structure),the network layer (block and transaction propagation),the consensus layer(block agreement),the incentive layer (reward),the smart contracts layer (business logic),and the application layer(programmable applications) [3].In this respect,various researchers have attempted to utilize blockchain technology in multiple applications to address current issues.

    Blockchain technology is combined with the existing vehicular ad-hoc network (VANET) protocols to solve the problems related to data sharing and vehicle authentication.In the present system,data is shared among the intelligent vehicles and RSUs over non-secure channels.As a result,there is a high probability that data may manipulate while sharing it with others.In its continuation,authors [4]presented a protocol for the secure sharing of event details among the RSU and vehicle authentication.They use the blockchain mechanism for secure storage of the event details.We found that their protocol uses a centralized mechanism(i.e.,cloud server) for vehicle authentication.In this paper,we improve their protocol without involving a trusted cloud server.The proposed solution uses the interplanetary file system (IPFS) and blockchain to store the event details and vehicle authentication.

    A.Major Contributions

    The main contributions of this work include the following points:

    1) This paper presents the weaknesses of the published work on blockchain-based data sharing and authentication scheme[4]and proposes an improved protocol.

    2) To provide a secure and reliable sharing of event information in the vehicular network,the decentralized authentication protocol is designed.

    3) A long with the blockchain,the proposed mechanism also leveragesIPFSfor storing event information in a distributed manner.

    4) This paper provides the data accessing policies for the user based on the Ethereum smart contract so that only the legitimate user can access the event details fromIPFS.

    5) The consensus procedure for the common key is also presented in the paper.

    6) Our security analysis confirms that the proposed protocol is free from relevant attacks such as sybil attack,man-in-themiddle attack,etc.,and achieves all the required security aspects.

    7) The various overheads (computation,communication,and storage cost) incurred while proposing the protocol iscomputed,and compared with the state-of-the-art research.

    B.Organization of the Papers

    The rest of the paper is organized as follows: The literature review of this work is in Section II.In Section III,we describe the loopholes of the Dwivediet al.scheme and provide solutions for overcoming the loopholes.The proposed architecture,decentralized authentication procedure,the user accessing policy,and consensus for the common key are discussed in Section IV.Section V presents the major security requirements and informal analysis of the proposed protocol.The performance analysis and comparisons with the existing scheme are discussed in Section VI followed by concluding remarks and the future scope of the paper in Section VII.

    II.RELATED WORKS

    This section introduces existing research that utilizes the blockchain mechanism and its features (such as immutability,decentralization,etc.) to provide secure data sharing and improve the privacy and security in communication protocols.Zhanget al.[5]proposed a data-sharing framework on the top of blockchain to tackle the announcing messages in internetof-vehicles (IoV).Their validation is based on the proof-ofwork and further uses a punish-reward mechanism to incentivize the vehicles.Authors in [6]discussed the messagedissemination problem and proposed a blockchain-based solution for the same.Kanget al.[7]proposed a delegated proof-of-stake consensus mechanism and reputation-based algorithm for the selection of miners.They use the multiweight subjective logic model for the computation of the vehicle’s reputation.Yanget al.[8]presented a decentralized trust management scheme to achieve the vehicle’s credibility.The proof-of-work and proof-of-stake approach with the Bayesian inference mathematical model is used to validate the vehicle’s message.The vehicle’s identity and message reliability play a crucial role in exchanging messages with other vehicles and RSU in the IoV.To solve this,the authors proposed a consortium blockchain-based data sharing and storage system [9].

    Further,the correctness and validation of traffic events is a tedious task in the current intelligent traffic management system.Yanget al.[10]presented the proof of event-based traffic event validation model.The events are collected by the RSU and submitted to the vehicles for validation purposes.To achieve trust,the authors proposed the authentication and entity-centric trust-building framework based on the blockchain [11].In this model,the selection of the miner node is based on the trust value.Kanget al.[12]proposed mobile edge computing and smart contract enabled blockchain to share the vehicular data.Furthermore,the three-weight subjective logic model is utilized for the vehicle’s reputation.Liet al.[13]presented the privacy-preserving incentive model for vehicles.Authors use the byzantine fault tolerance consensus mechanism,which requires both vehicle and RSU to agree on a block’s validity.Authors in [4]proposed the secure event information sharing protocol based on the blockchain for the vehicular network.Their protocol uses the cloud server for vehicle authentication and blockchain for storing the event information among all RSUs.Luet al.[14]proposed the directed acyclic graph and permissioned blockchain-based asynchronous federated learning system for safe data exchange in IoV.Furthermore,for the selection of nodes and their optimization,they employ a deep reinforcement learning technique.

    Authors in [15]utilized the proof-of-work consensus and vehicle’s trust for solving the message dissemination problem in the VANET.Similarly,the reputation algorithm was used in [16]for solving the distribution of forged messages.Luet al.[17]utilized the proof-of-absence and proof-ofpresence-based consensus protocol for solving the trust issues in VANET.On the other hand,Zhenget al.[18]implemented the paillier cryptosystem for safe data exchange.Huanget al.[19]proposed a blockchain and smart contracts (Stackelberg game) enabled framework to achieve the parked vehicleassisted fog computing services in a decentralized manner.Table I shows the research gap and blockchain-specific challenge addressed by the existing solutions.

    III.LOOPHOLES IN Dw IVEDI ET AL.’S SCHEME

    This section describes the various drawbacks that areassociated with existing work blockchain-based data sharing and authentication scheme [4],which are listed below:

    1) Partially Decentralized System:In the Dwivediet al.scheme,roadside unitRS Usubmits the vehicleVEHregistration details to the cloud serverCS,andCSmaintains the ledger,which stores the registration details forRS UandVEH.As a consequence,CSpossesses all of theRS UandVEHdetails,resulting in a partially decentralized network where all the sensitive information of the system is stored in a single place.

    2) Single-Point-of-Failure (SPoF) Problem:The entire functioning of the Dwivediet al.scheme is dependent on the availability of the information provided by theCS.Ifsomehow,theCSis offline (or crashed),their system will not work.As a result,we infer that the SPoF issue still exists in their approach.

    TABLE IRESEARCH GAP AND BLOCKCHAIN SPECIFIC CHALLENGE ADDRESSED IN THE EXISTING BLOCKCHAIN-BASED SCHEME FOR VANET

    3) Centralized Authentication Mechanism:In the Dwivediet al.scheme,CSperforms authentication ofVEH.To accomplish this,VEHsends the event informationEmwith the necessary parameters (such as 〈IDVEH,IDRS U,Em〉) toRS U.RS Usecurely forwards these details to theCS.TheCSdoes the computation and informs the appropriateRS Uas to whether or not theVEHauthentication was successful.Hence,we conclude that they use a centralized authentication mechanism.

    4) Storage Capability Constraint:In the Dwivediet al.scheme,they assume that theRS U shave enough storage space.Therefore,it can store the event-information (both data and hash) of any length,which is further based on the blockchain mechanism.

    A.Solutions for Overcoming the Loopholes of Dwivedi et.al.’s Scheme

    This section briefly discusses how the proposed methodology overcomes the loopholes of the Dwivediet al.scheme.Each point is discussed below:

    1) Fully Decentralized System:The blockchain-based solution provided by Dwivediet al.utilizes a third party as a cloud serverCSwhich stores the crucial information ofVEHandRS U.We further improve their scheme and propose a new system that is completely free from theCS.In our approach,both theVEHand event information are stored in a decentralized manner.As a result,our plan offers a completely decentralized structure.

    2) No SPoF Problem:Furthermore,the Dwivediet al.scheme suffers from the SPoF problem because essentialVEHinformation is available in a single place.Our method makes use of blockchain to storeVEHinformation in a fully decentralized manner.As a result,our system never has a SPoF problem.

    3) Decentralized Authentication Mechanism:TheCSconductsVEHauthentication in the Dwivediet al.system.However,we suggest a novel method for disseminating VEH information across all of the system’s accessibleRS U.As a result,anyRS Umay use the blockchain to conductVEHauthentication.

    4) No Storage Capability Constraint:To overcome the storage capability constraint of the Dwivediet al.scheme,our suggested protocol combinesIPFSwith a blockchain method to tackle theRS Ustorage problem.IPFSis a distributed file system that stores data across the globe.To further retrieve the data fromIPFS,we also give users access rules based on the smart contract.

    IV.PROPOSED SYSTEM

    A.System Overview

    This section tries to improve existing blockchain-based data sharing and authentication scheme [4]without including the cloud server as a trusted third party (TTP).As shown in Fig 1,the proposed blockchain-enabled protocol consists of network administratorNA,roadside unitRS U,vehicleVEH,and blockchain network with theIPFS.A ll the notations that are used throughout the paper are illustrated in Table II.A brief description of the entities are given below.

    Network Administrator〈NA〉:In the proposed protocol,NAperforms the registration ofRS U.Before deployingRS Uin the network,NAdoes the off-line registration and stores the common keyKin allRS U s.The keyKis used by theRS Uto exchange the hash that it receives fromIPFS.The key is valid only for the fixed duration ofT.After the timeThas passed,anyRS Umust execute the common key generation and consensus procedure and distribute the new keyK1to allRS Us.

    Fig.1.Proposed architecture1No.1 indicates the vehicles and RS U registration performed by the RS Uand network administrator,respectively.No.2 indicates that the vehicle collects the event information using its sensing units and sends it to the nearest RS U for further processing.No.3 indicates RS Uvalidates the event information and executes the smart contracts for creating the new block.No.4 and No.5 indicate that verified event information is published on IPFS,and in return,IPFSprovides the hash of that event to RS U.No.6 indicates the user registration and authentication procedure.No.7 indicates that after the user’s successful authentication,RS Uprovides the hash of the event to the user.No.8 and No.9 indicate the user request for event details from IPFS,and in return,IPFSprovides the event detail to the user..

    Roadside Unit〈RS U〉:RS Usperform the registration of vehicleVEH.In our considered model,RS Uis located in different places geographically,but the distance between twoRS U sis three or four kilometres.It is essential that oneVEHhas to register with oneRS U.After the successful registration ofVEH,RS Uselects a few registration parameters,creates a block 〈B1〉,and executes the block-validation procedure.Once block validation is successful,theRS Uhands over the index of block 〈B1〉(i.e.,IB1)toVEH.Now for further authentication ofVEH,itmust provideIB1along with the registration parameters.

    Vehicle〈VEH〉:TheVEHhas anOBU,Wi-Fi,a global positioning system (GPS),etc.It has limited computational and storage capabilities and stores only a few sensitive parameters such as an identity ofRS U IDRS U,the identity ofVEH TIDVEH,A,B,etc.TheVEHgathersEmand forwardsit to the nearbyRS Ufor further processing.

    TABLE IIDESCRIPTIONS OF VARIOUS NOTATIONS USED IN PROPOSED SCHEME

    Blockchain and〈IPFS〉:The proposed work mainly focuses on decentralized authentication and distributed data storage(events) based onIPFSand blockchain.IPFSemploys the content addressable methodology that can resolve the issue of blockchain storage.The main idea behindIPFSis to store the encrypted data or files in decentralized nodes,and on behalf of this,IPFSprovides the hash of encrypted data as a service.The encrypted data fromIPFSis retrieved using this hash.

    Smart Contracts:Unlike traditional contracts,smart contracts are computerized programs,which execute automatically once the conditions of the contracts among the peers (nodes) are satisfied.It operates on a decentralized platform such as an Ethereum-based blockchain network.As a result,a third party does not require to execute the transactions (or assets) and their validation.Smart contracts are immutable and cryptographically secure.Our proposed methodology utilizes the Ethereum-enabled smart contracts to securely store the event details in theIPFSand retrieve event details fromIPFSvia theRS U(see A lgorithm 1).By doing so,the immutable event details are present in theIPFS.Therefore,in the future,if any authentic user wants to access event details from blockchain-enabledIPFSservers,they can access it once the smart contract conditions are satisfied.

    Algorithm 1 Smart Contract Algorithm for Accessing Emfrom IPFSThrough RS Ua

    Our proposed scheme is divided into several phases,beginning with the registration phase in which vehicle andRS Uregistration are done by theRS UandNA,respectively.The event collectionEmandVEH’sauthentication is the second phase in which theRS UperformsVEH’sauthentication using the blockchain.A detailed description of all the phases provided in the Sections IV-B–IV-E.

    B.Registration Phase

    1) Roadside Unit(RS U)Registration

    2) Vehicle(VEH)Registration

    The following steps are executed by theVEH.

    C.Transaction-Generation (Event Detection) Phase

    During this phase,one of the vehicleVEHcollects the critical events (e.g.,accident on the road,traffic congestion,etc.) through its OBU and Wi-Fi units,and sends it (along withTIDVEHb,IDRS Ua) to the nearestRS U.ThatRS Uchecks the integrity of the event and confirms the necessary action accordingly.We consider that the eventEmis collected by theVEHb,and it forwardsEmto theRS Ua.

    D.Block Creation Phase

    In this phase,RS Uacreates blocks 〈B1,B2〉,which are based on the proof-of-work consensus mechanism2Proof-of-work is the mechanism that provides the consensus (common agreement) among the decentralized network nodes.Its principle is based on a solution (the current hash of a block) that is difficult to find,but at the same time,verification is easy for that solution.Here,the nodes of the decentralized network are continuously engaged in finding a nonce value which,when hashed with the previous block hash with necessary parameters,produces a resultant lesser than the predefined threshold..The parameters〈AVEHb,IDRS Ua,CVEHb,RVEHb〉 are used for the computation of merkle rootrootmerofB1,and forB2,parameters〈TIDVEHb,Em〉 are used.Therootmeris stored in the block header for the computation of current block hashhashcuras shown in

    where for blockB1,(rootmer) is computed as

    and for blockB2,(rootmer)is computed as

    3H1is a hash value,which is computed by hashing pairs ofAVEHband IDRSUa.

    4H2is a hash value,which is computed by hashing pairs ofCVEHbandRRSUa.

    5H3is a hash value,which is computed by hashing ofTIDVEHb.

    6H4is a hash value,which is computedby hashing of Em,where ash(·)is one wa y hash function (e.g.,SHA-2 5 6).

    hashpre= Hash of previous block

    Initially,Nis set to zero,and at each iteration,it is incremented by one.The block values (hashpre),(rootmer),and (TSi) are repeatedly hashed with different values ofNfor the computation of current hash index (hashcur).A fter the block creation is successful,RS Uahands over the index of blockB1(i.e.,IB1)to the respective vehicleVEHb.As a result,IB1is used by the otherRS U sof the system to accomplish the decentralized vehicle’s authentication.The blockB2is securely stored in the blockchain,which is maintained by theRS Uof the system.

    E.Vehicle Authentication and Event Storage Procedure

    In Section IV-C,we consider that theVEHbcollectsEmand sends parameters 〈TIDVEHb,IDRS Ua,AVEHb,CVEHb,RVEHb,B,Em,IB1〉 toRS Ua.The procedure for vehicle authentication is illustrated below:

    F.Accessing Stored Event Em From IPFS

    This section presents the smart contract algorithm,which is developed and implemented as a solution to retrieve the stored eventEmfromIPFSthrough theRS U.

    The smart contract is developed in solidity programming language and tested with Remix IDE.TheRS Uand UserUS Riare the two main actors of our proposed contract,and each is identified via an Ethereum address (EA).The user registers in the system through the smart contract,and everyUS Riis associated with a unique Ethereum address (EA).After the successful registration of theUS Ri,the contract creates a unique tokenTKN.TheTKNis computed based on the user Ethereum address (EA(US R)) and identity of RSU(ID(RS U)).ThisTKNis used in the later stages for interacting with the contract.

    If the end-userUS Ri(e.g.,police: verifying suspicious activity) wants to access the data (or eventEm),theUS Riprovides the essential parameters (such as the identity of a vehicle,timestamp of event,Ethereum address ofUS Ri,andRS U) required for the authentication of the smart contract.To authenticate theUS Ri,the following conditions must be satisfied: 1)EA(RS U) exists in the contract,2)EA(US R)exists in the contract,and 3) there exists a validTKNin the contract.If the aforementioned requirements are met,then the contract confirms that theUS Riis authenticated successfully.After the successful registration and authentication ofUS Ri,RS Uprovides thehashof the desired eventEmto theUS Ri.TheUS Riinvokes a query (it seeks to obtain the original eventEmthat corresponds to thishash) fromIPFS,and in return,IPFSprovides the desired eventEmto the concerned user.The procedure for accessing policy ofEmthroughIPFSforUS Riis illustrated in A lgorithm 1,and smart contract evaluation for the same algorithm is presented in Section VI-A.

    G.Consensus Procedure for Common KeyK

    TheRS Usshould agree on the keyK,as indicated in Section IV-B.This agreement is ideal for our system becauseIPFSgives hash to the initiatorRS Uon behalf of the stored event.For better accessing of events fromIPFS,allRS U smust exchange it.The authentication method for theRS Uis also shown in this Section to allow secure communication betweenRS U sand improve system security.

    Step 1:At the time of deployment to theRS Uin the system,NAstores random lyNnumber of hashes in oneRS U.We believe thatNAshould keep it onRS Ua.

    Step 2: RS Uacreates a merkle tree from the storedNnumber of hashes and securely stores the root value of merkle treerootmer.In addition,theRS Uaalso creates a genesis block (first block of a blockchain) from the computedrootmeras in (3),wherehashpreis all zero values for the genesis block.

    Step 3:Now,RS Uarandom ly choosesMnumber of hashes from the storedNnumber of hashes (whereM≤N).After the selection procedure is completed,RS UaconcatenatesMnumber of hashes and sends it to the otherRS U s,which is encryptedE(·) using the public key ofRS U(PURS U).

    Step 4:OtherRS U sin the system decryptD(·) it using their private keyPRRS U,and compute the common keyKincluding theRS Uaas in

    where hashH1andHMhave selected fromNnumber of hashes,andTis the current time-stamp.

    Step 5:A fter computingK,the initiatorRS Uacomputes the new parametersS1andS2and sendsS2to the otherRS U sof the system.

    wherePRRSUais the private key ofRS Ua(which enables digitalsignature),andKis the computed common key.

    Step 6:Once otherRS Usreceive the parameterS2,they use the keyKto decryptD(·)S2.It is noted that they have computedKin Step 4.

    Step 7:After thatRS UsdecryptD(·)S1by using public key ofPURS Ua,and verify whether the receivedKis the same as the computedKor not.

    Step 8:Steps 1 through 7 ensure that allRS U sagree on the common keyK,which is further used to exchangehashesprovided byIPFS.Moreover,the identity ofRS Ua(i.e.,IDRS Ua) is also present in the encrypted messageS1.Therefore,it confirms thatRS Uais an authenticRS U.

    H.Procedure for Generating the New KeyK1

    RS U sagree on the keyKfor exchanging thehashas stated in Section IV-G.The key was exchanged among theRS Ususing theNA-generated public and private keys 〈PURS U,PRRS U〉.As a result,there may be a chance thatNAmay reveal thePRRS Uto a third party,allowing the third party to keep track of the hash supplied by thehash.To fix this problem,the key must be changed after a certain period.Here,we assume that theRS Uawishes to create a new common keyK1.RS Uadoes this by adding the prior key into the pool of the existingNnumber of hashes,and randomly selectsMnumber of hashes (whereM≤N+1).A fter that,for creating the new common key,the same procedure is repeated as discussed in Section IV-G (from Step 3 to Step 8).The only difference is that this time,instead of utilizing keyK,keyK1is used to compute parametersS1andS2,andE(·) andD(·)operations are conducted using theK1.Once consensus is achieved forK1,RS Ususe it to exchange the hash given by t heIPFS.

    V.SECURITY REQUIREMENTS AND INFORMAL ANALYSIS

    In order to meet the effective operations ofVEHandRS U,the necessary security requirement such as authentication,integrity,and availability must be achieved by the system.This section first discusses how the proposed scheme achieves these security requirements and then discusses the relevant security attacks.

    Authentication,Integrity,& Availability:The parameters for creating a block for authentication ofVEHb〈AVEHb,IDRS Ua,CVEHb,RVEHb〉 (i.e.,rootmer) are permanently recorded in the blockchain,as mentioned in Section IV-D.Therefore,anyRS Uof the system may conduct the authentication ofVEHb.Moreover,VEHbcomputesB=H(Em‖RVEHb) and sends parameters 〈TIDVEHb,IDRS Ua,AVEHb,CVEHb,RVEHb,B,Em,IB1〉toRS Ua.In order to ensure the integrity ofEm,RS UarecomputesB′=H(Em‖RVEHb) and verifies the condition(B′==B).In addition to this,events are stored in the blockchain,and it is always available inIPFS.

    Sybil Attack:Under the sybil attack,an adversary creates multiple fraudulent identities and controls them over a decentralized peer-to-peer network.The objective is to segregate the target node from the rest of the honest nodes to gain a major influence in the network,carry out illegal activities,launch different attacks such as double-spending,refuse the transactions and blocks,etc.In the proposed protocol,VEHbhas a unique identity 〈IIDVEHb,TIDVEHb〉,and its identities are not shared with otherVEHsof the system.Before the sharing of event details withRS Ua,VEHbis first authenticated using the blockchain (i.e.,IB1).TheVEHbis not allowed to acquire multiple identities,and anyhow,ifVEHbgets the more than one identity,the required condition for authenticationis not satisfied.Therefore,launching the sybil attack from an adversary perspective is almost impossible.

    Message Substitution Attack:In the proposed protocol,VEHbsends the event details toRS Ua,which mainly uses the hashing and encryption operations.The event detailEmis hashed with the parameterRVEHb,which is subsequently encrypted usingPURS Ua,and then sends the encrypted parameter toRS Ua.Therefore,if an adversary somehow getsRVEHb,the adversary can not get the original transaction due to the pre-image resistance property of hash functions,and the required condition (B′==B) is also checked during the transaction (or message) generation and authentication phase.As a result,a message substitution attack is not possible in the proposed protocol.

    Man-in-the-Middle Attack:Assume that an adversary intercepts an authentication message which is sent fromVEHbtoRS Uain the message generation and authentication phase and that it uses a third party to perform this attack.Since the proposed protocol uses the blockchain for authentication ofVEHb,and the sensitive identity information 〈AVEHb,IDRS Ua〉is permanently stored in the blockchain,and it is distributedover severalRS U s,which are linked to the previous block.Therefore,if the third party publishes the fake keys,it has to change the entire chain,which is computationally not feasible,and easily traceable by otherRS U s.Thus,this scheme can resist man-in-the-middle attacks.

    TABLE IIICOMPUTATION, COMMUNICATION AND STORAGE COST OF PROPOSED PROTOCOL AND COMPARED WITH REFERENCE [4] PROTOCOL7P-I : Registration of vehicle and RSU; P-II : Event generation and authentication; Tpg: Time required by PKG function; Tp f: Time required by PUF; Te : Time required to encrypt parameters; Td: Time required to decrypt parameters;Th:Time required by One-way hash function;Tδ1:Time required for searching the parameters in ledger;Tδ2 :Time required for matching the required conditions;

    Blockify Attack:Under the blockify attack,an adversary intentionally steals the other’s block information from the public (or) private blockchain and tries to include it into their own blockchain.The adversary’s objective is to create the identical replica of blockchain so that it can carry out illegal activities.Assume that the third partyTPsomehow gets the new blockBi,and it wants to add this block into its blockchain network.SinceTPknows only the partial information from the public channel,it cannot recompute thehashcurbecauseTPdoes not know the value ofhashpre.Moreover,ifTPwillfully wants to knowhashpre,it must change the entire chain of blocks,which is computationally infeasible.As a result,the suggested technique is resistant to t he blockify attack.

    VI.PERFORMANCE ANALYSIS AND COMPARISON

    In this section,we present the performance of the proposed scheme and compare it with the state-of-the-art research.The security properties such as computation and storage cost of the node,communication cost between two nodes are used for measuring the performance of both the schemes.For measuring and comparing this cost,we considered only one vehicleVEHband one roadside unitRS Ua.The proposed approach mainly uses the encryptionE(·) and decryptionD(·) operations along with the lightweight hash functionh(·).256-bit hash function is used for the computation ofTh.PKGis used(the first time only) for the generation of keys ofRS U.For the comparison with the existing scheme,we consider that the length of vehicle and RSU identity (i.e.,IDRS Ua,IDVEHb),and parameters 〈TIDVEHb,AVEHb,CVEHb〉 each takes 128 bits.Table III provides the computation,communication,and storage cost comparison between the proposed scheme and the state-of-the-art research [4].

    The proposed scheme utilizes the keyKfor the exchange ofhash(provided by theIPFS) among allRS Us.The various costs such as computation,communication,and storage involved in the consensus procedure of key is [(2N?1)Th+(2M?1)Th+ 2Te+ 2Td],[(M×256) + 128]bits,and[(N×256)+ 128]bits,respectively.HereNindicates the total number of hashes stored inRS UaandMindicates the number of hashes picks in the current iteration for generating theK,andM≤N.Fig.2 presents the storage cost (in bytes) of the proposed protocol and the state-of-the-art [4],[20],[21].It is noted that the proposed protocol achieves better performance than the existing protocols.

    Fig.2.Comparison of vehicle’s storage cost with existing scheme8In Javed et al.and Shi et al.approach,nand tis the cryptoid of vehicles,and time-stamp,respectively.For comparison,we consider nand tis length of 32 bytes and 4 bytes..

    A.Remix IDE and Solidity-Based Evaluation of Smart Contract

    The proposed smart contract illustrated in A lgorithm 1 for accessing theEmfrom IPFS throughRS Uis validated and evaluated with the solidity language.The identity ofRS Ua,Ethereum address ofUS Ri,and Ethereum address ofRS Uaare inputs for the Algorithm 1.The output of the Algorithm 1 iseventmand hash of that event.Symbolically inputs and outputs are represented by 〈IDRS Ua,EA(US Ri),EA(RS Ua)〉and 〈Em,hash〉,respectively.The REM IX IDE and Solidity version 0.5.10 with a specification of Win 10,8 GB of RAM,Intel (R) Core (TM) i5-8250U CPU @1:60 GHz,64-bit OS is used for the validation and evaluation.

    1) Deploying Cost:

    The proposed smart contract presented in the Algorithm 1 is deployed in the JavaScript VM environment.0xddaad340b0 f1ef65169ae5e41a8b10776a75482dis the smart contract address,and0x5B38Da6a701c568545dCfcB03FcB875f56 beddC4is the account address.The same account address is used for deploying the smart contract under different intervals.In solidity,every execution step has a cost (transaction and execution cost) associated in terms of GAS.Fig.3 shows the analogy of the cost of deploying the proposed smart contracts in JavaScript VM and publish the same to theIPFS.Interestingly,the same cost is consumed by the contract inboth environments.

    Fig.3.Deploying cost of smart contract.

    2) Transaction Cost vs Execution Cost:

    Users first do the registration in our system through smart contracts if they want to access the stored data fromIPFS.The smart contract should design in such a way that we can analyze the transaction and execution cost to understand how our system behaves with an increasing amount of data stored in theIPFS.User registration and its authentication and fetching the stored data fromIPFSall are variable and independent processes.Variable by means that the size of event information varies and independent indicates that the fetching the stored data fromIPFSare not dependent on each other.Fig.4 shows the analysis of execution cost and transaction cost (in terms of GAS) of proposed smart contracts.The cost required for sending the program to a blockchain is known as transaction cost.In contrast,the cost required to execute the computational operations is known as execution cost.For the accurate analysis of transaction and execution cost,the variable number of users is registered using smart contracts.It is observed that every time the rate of grow th of the curve is the same,and the transaction costs are much higher than the execution costs.

    Fig.4.Transaction cost and execution cost of smart contract.

    VII.CONCLUDING REMARKS & FUTURE SCOPE

    This work presents the blockchain-based decentralized architecture for secure sharing of event information among RSUs without considering trusted third parties like a cloud server.This paper examined existing blockchain-based protocol and illustrated the weaknesses ofthe same protocol.Further,to address the security weaknesses,this article provides the improved event sharing and vehicle authentication protocol based on theIPFSand blockchain.The proposed protocol utilizes theIPFSfor storing the information in a distributed manner and authenticate the vehicle using the blockchain.The consensus mechanism for the common key is also presented in the paper.The security analysis of the protocol confirms that the protocol is free from all possible attacks and achieves security requirements.We also computed the computation,communication,and storage cost of the proposed protocol and compared it with state-ofthe-art research.The performance section confirms that the proposed protocol is competent enough than the existing protocols.In future research,we will work more on the smart contracts mechanism and enhance our proposed scheme’s security.

    这个男人来自地球电影免费观看| 美女国产高潮福利片在线看| 法律面前人人平等表现在哪些方面 | 人人妻,人人澡人人爽秒播| 国产精品久久久久久精品电影小说| 亚洲专区国产一区二区| 美女福利国产在线| 岛国在线观看网站| av电影中文网址| 欧美国产精品va在线观看不卡| 亚洲精品av麻豆狂野| 午夜福利视频精品| 中文字幕av电影在线播放| 久久午夜综合久久蜜桃| 久久久久国产一级毛片高清牌| 久久久国产成人免费| 中文欧美无线码| 老司机影院毛片| 午夜福利免费观看在线| 女人久久www免费人成看片| 国产欧美亚洲国产| 午夜福利在线免费观看网站| 国产福利在线免费观看视频| 免费高清在线观看视频在线观看| 亚洲人成电影免费在线| 精品国产一区二区久久| 各种免费的搞黄视频| 国产成人影院久久av| 国产成人精品无人区| 亚洲精品美女久久av网站| 亚洲国产精品999| 精品人妻在线不人妻| 美女高潮喷水抽搐中文字幕| 在线精品无人区一区二区三| videosex国产| 满18在线观看网站| 天天操日日干夜夜撸| 亚洲美女黄色视频免费看| 国产麻豆69| 久久久久久亚洲精品国产蜜桃av| 成人国产av品久久久| 久久精品亚洲av国产电影网| 多毛熟女@视频| 女性被躁到高潮视频| 在线观看一区二区三区激情| 啪啪无遮挡十八禁网站| 国产亚洲午夜精品一区二区久久| 亚洲午夜精品一区,二区,三区| av在线老鸭窝| 国产精品av久久久久免费| 菩萨蛮人人尽说江南好唐韦庄| 精品少妇久久久久久888优播| 国产亚洲av高清不卡| 国产精品久久久人人做人人爽| 天天操日日干夜夜撸| 国产亚洲欧美精品永久| 下体分泌物呈黄色| 国产av一区二区精品久久| 高清黄色对白视频在线免费看| 国产精品亚洲av一区麻豆| 一级毛片电影观看| 午夜日韩欧美国产| 精品亚洲乱码少妇综合久久| 丝袜美腿诱惑在线| 国产精品亚洲av一区麻豆| av电影中文网址| 十八禁高潮呻吟视频| 国产免费现黄频在线看| 夜夜夜夜夜久久久久| 王馨瑶露胸无遮挡在线观看| 国产亚洲精品第一综合不卡| 纵有疾风起免费观看全集完整版| 制服人妻中文乱码| 国产一级毛片在线| 欧美激情极品国产一区二区三区| 亚洲伊人久久精品综合| 一本久久精品| av在线app专区| 国产一区二区激情短视频 | 无遮挡黄片免费观看| 欧美激情高清一区二区三区| 男女高潮啪啪啪动态图| 久久久久久免费高清国产稀缺| 人人妻人人爽人人添夜夜欢视频| 视频区图区小说| 色播在线永久视频| 精品亚洲乱码少妇综合久久| 精品国产乱码久久久久久男人| 国产av又大| 天天躁狠狠躁夜夜躁狠狠躁| 国产精品自产拍在线观看55亚洲 | 欧美亚洲 丝袜 人妻 在线| 亚洲精品国产色婷婷电影| av免费在线观看网站| 国产精品国产av在线观看| 又大又爽又粗| 午夜福利视频精品| 国产成人欧美| 精品亚洲成a人片在线观看| 老司机午夜十八禁免费视频| 啪啪无遮挡十八禁网站| 精品国产一区二区三区四区第35| 亚洲熟女毛片儿| 国产日韩一区二区三区精品不卡| 国产黄色免费在线视频| 欧美人与性动交α欧美精品济南到| 美女高潮到喷水免费观看| 成人免费观看视频高清| 亚洲欧美精品自产自拍| 色精品久久人妻99蜜桃| 一区在线观看完整版| 国产国语露脸激情在线看| 国产色视频综合| 国产精品久久久人人做人人爽| 性色av一级| 看免费av毛片| 国产成人免费无遮挡视频| www.熟女人妻精品国产| svipshipincom国产片| 别揉我奶头~嗯~啊~动态视频 | 亚洲欧美日韩另类电影网站| 国产在线视频一区二区| 国产成人免费观看mmmm| 亚洲一区中文字幕在线| 免费在线观看完整版高清| 欧美日韩一级在线毛片| 亚洲专区字幕在线| 精品视频人人做人人爽| 久久免费观看电影| 两个人看的免费小视频| 男人舔女人的私密视频| 国产福利在线免费观看视频| 国产精品 欧美亚洲| 亚洲欧美精品综合一区二区三区| 亚洲成人国产一区在线观看| 午夜老司机福利片| 成年人午夜在线观看视频| 巨乳人妻的诱惑在线观看| 捣出白浆h1v1| 久久精品久久久久久噜噜老黄| 黑人操中国人逼视频| 欧美精品高潮呻吟av久久| 亚洲国产欧美一区二区综合| 黄片播放在线免费| av在线app专区| 男女免费视频国产| 成人影院久久| 女人被躁到高潮嗷嗷叫费观| 欧美在线一区亚洲| 国产97色在线日韩免费| av免费在线观看网站| 91精品三级在线观看| 国产精品秋霞免费鲁丝片| 亚洲中文日韩欧美视频| 国产在线观看jvid| 国产精品偷伦视频观看了| 国产免费视频播放在线视频| 午夜福利一区二区在线看| 欧美日韩视频精品一区| 人妻人人澡人人爽人人| 在线永久观看黄色视频| 男人操女人黄网站| 超碰成人久久| www.av在线官网国产| 18禁裸乳无遮挡动漫免费视频| 日韩 亚洲 欧美在线| 日韩,欧美,国产一区二区三区| 日本vs欧美在线观看视频| 岛国在线观看网站| 在线精品无人区一区二区三| 欧美另类亚洲清纯唯美| 美女视频免费永久观看网站| 欧美xxⅹ黑人| 免费一级毛片在线播放高清视频 | 51午夜福利影视在线观看| 国产片内射在线| 久久久久久久大尺度免费视频| 俄罗斯特黄特色一大片| 欧美少妇被猛烈插入视频| 飞空精品影院首页| 久久99一区二区三区| 久久综合国产亚洲精品| 亚洲成人免费av在线播放| av超薄肉色丝袜交足视频| 一级毛片女人18水好多| 欧美日韩黄片免| av线在线观看网站| 免费av中文字幕在线| 欧美国产精品一级二级三级| 欧美人与性动交α欧美软件| 午夜两性在线视频| 80岁老熟妇乱子伦牲交| 午夜福利在线观看吧| 搡老乐熟女国产| 性色av一级| 女人久久www免费人成看片| 亚洲免费av在线视频| 中文字幕精品免费在线观看视频| 动漫黄色视频在线观看| 久久精品熟女亚洲av麻豆精品| 色94色欧美一区二区| 免费观看av网站的网址| 视频区图区小说| 久久综合国产亚洲精品| 亚洲精品第二区| 蜜桃国产av成人99| 日韩欧美国产一区二区入口| 亚洲成人免费av在线播放| 久久亚洲精品不卡| 深夜精品福利| 免费观看av网站的网址| 国产熟女午夜一区二区三区| 在线av久久热| 男男h啪啪无遮挡| 美女国产高潮福利片在线看| 国产亚洲一区二区精品| 91字幕亚洲| 亚洲第一av免费看| 久久中文看片网| 午夜福利免费观看在线| 免费看十八禁软件| 国产区一区二久久| 日日摸夜夜添夜夜添小说| 国产一级毛片在线| 久久天堂一区二区三区四区| 如日韩欧美国产精品一区二区三区| 精品第一国产精品| 少妇猛男粗大的猛烈进出视频| 亚洲欧美清纯卡通| 亚洲成人免费电影在线观看| 亚洲伊人色综图| 日韩欧美一区二区三区在线观看 | 国产一区二区三区av在线| 18禁黄网站禁片午夜丰满| 搡老乐熟女国产| 在线十欧美十亚洲十日本专区| 亚洲成人免费电影在线观看| 国产一卡二卡三卡精品| 欧美精品人与动牲交sv欧美| 亚洲第一欧美日韩一区二区三区 | 日韩欧美免费精品| a在线观看视频网站| 久久这里只有精品19| 亚洲avbb在线观看| 亚洲精品久久午夜乱码| 欧美性长视频在线观看| 精品人妻1区二区| 午夜福利乱码中文字幕| www.av在线官网国产| 国产精品久久久久久人妻精品电影 | 1024香蕉在线观看| 精品国产乱码久久久久久男人| 精品国产乱码久久久久久小说| 熟女少妇亚洲综合色aaa.| av在线播放精品| 欧美人与性动交α欧美软件| 黑人巨大精品欧美一区二区mp4| 国产av一区二区精品久久| 精品福利永久在线观看| 国产成人av教育| 久久ye,这里只有精品| av国产精品久久久久影院| 免费在线观看视频国产中文字幕亚洲 | 午夜福利一区二区在线看| 美女高潮到喷水免费观看| 亚洲av欧美aⅴ国产| 亚洲第一欧美日韩一区二区三区 | xxxhd国产人妻xxx| 亚洲国产欧美日韩在线播放| 亚洲av日韩精品久久久久久密| 成人国产av品久久久| 美女主播在线视频| 久久久国产一区二区| 午夜成年电影在线免费观看| 日日夜夜操网爽| www日本在线高清视频| 久久人人爽人人片av| 久久精品国产a三级三级三级| 久久久精品免费免费高清| 亚洲中文av在线| 交换朋友夫妻互换小说| 99精品久久久久人妻精品| 亚洲第一欧美日韩一区二区三区 | 久久免费观看电影| 午夜老司机福利片| 久久久精品94久久精品| 91精品伊人久久大香线蕉| a级毛片黄视频| 老司机靠b影院| 亚洲第一av免费看| 国产又色又爽无遮挡免| 亚洲国产看品久久| av有码第一页| 又大又爽又粗| 一本色道久久久久久精品综合| 久久午夜综合久久蜜桃| 又黄又粗又硬又大视频| 999精品在线视频| 精品国产一区二区三区四区第35| 亚洲精品粉嫩美女一区| 伊人亚洲综合成人网| 日本一区二区免费在线视频| 多毛熟女@视频| 国产亚洲精品一区二区www | 中国美女看黄片| 一本—道久久a久久精品蜜桃钙片| av天堂久久9| 欧美精品啪啪一区二区三区 | 午夜福利,免费看| 国产福利在线免费观看视频| 日本vs欧美在线观看视频| 一级a爱视频在线免费观看| 亚洲成人免费av在线播放| 热99re8久久精品国产| 夜夜夜夜夜久久久久| 久久99热这里只频精品6学生| 免费日韩欧美在线观看| 纯流量卡能插随身wifi吗| 亚洲视频免费观看视频| 操出白浆在线播放| 97人妻天天添夜夜摸| www.999成人在线观看| 99精品久久久久人妻精品| av一本久久久久| 免费日韩欧美在线观看| 成年av动漫网址| 两个人免费观看高清视频| 叶爱在线成人免费视频播放| 69精品国产乱码久久久| 久久久久精品国产欧美久久久 | 久久久精品区二区三区| 日韩精品免费视频一区二区三区| 一个人免费在线观看的高清视频 | 国产男人的电影天堂91| 99国产精品99久久久久| 亚洲三区欧美一区| 精品一品国产午夜福利视频| 叶爱在线成人免费视频播放| 18禁黄网站禁片午夜丰满| 两个人看的免费小视频| 狂野欧美激情性bbbbbb| 搡老岳熟女国产| 欧美变态另类bdsm刘玥| 国产精品久久久人人做人人爽| 久久精品人人爽人人爽视色| 黄片大片在线免费观看| 国产极品粉嫩免费观看在线| 日韩大片免费观看网站| √禁漫天堂资源中文www| 国产成人av激情在线播放| 国产精品免费视频内射| 国产真人三级小视频在线观看| 国产成人精品在线电影| 在线观看免费午夜福利视频| 青青草视频在线视频观看| 侵犯人妻中文字幕一二三四区| 国产在线观看jvid| 国产精品av久久久久免费| 一区二区av电影网| 窝窝影院91人妻| 欧美日韩黄片免| 黄片小视频在线播放| 亚洲精品自拍成人| 欧美中文综合在线视频| 在线 av 中文字幕| 亚洲欧美色中文字幕在线| 99国产综合亚洲精品| 日本撒尿小便嘘嘘汇集6| 啦啦啦视频在线资源免费观看| 婷婷成人精品国产| 午夜福利,免费看| 欧美日韩成人在线一区二区| 欧美精品av麻豆av| 久久久久国产精品人妻一区二区| 美女午夜性视频免费| 中文字幕人妻丝袜制服| 在线av久久热| 中文字幕精品免费在线观看视频| videos熟女内射| 叶爱在线成人免费视频播放| 两人在一起打扑克的视频| 午夜日韩欧美国产| 人人妻,人人澡人人爽秒播| videosex国产| 久久这里只有精品19| 色播在线永久视频| 99国产极品粉嫩在线观看| 91成年电影在线观看| 国产成人av教育| 亚洲av成人一区二区三| 99国产极品粉嫩在线观看| 亚洲性夜色夜夜综合| 国产97色在线日韩免费| 亚洲欧美清纯卡通| 天天影视国产精品| 99国产精品一区二区蜜桃av | 极品少妇高潮喷水抽搐| 亚洲性夜色夜夜综合| 日韩大片免费观看网站| 欧美 亚洲 国产 日韩一| 欧美av亚洲av综合av国产av| 51午夜福利影视在线观看| 成人三级做爰电影| 精品福利观看| 亚洲视频免费观看视频| 国产精品成人在线| 精品国内亚洲2022精品成人 | 久久久久精品人妻al黑| 别揉我奶头~嗯~啊~动态视频 | 精品乱码久久久久久99久播| 成人手机av| 一区二区三区四区激情视频| 久久久久久久大尺度免费视频| 女人久久www免费人成看片| 日韩制服骚丝袜av| 亚洲专区字幕在线| 精品国产一区二区三区四区第35| 人成视频在线观看免费观看| 久久久精品94久久精品| 国产亚洲一区二区精品| 成年人免费黄色播放视频| 久久这里只有精品19| 久热爱精品视频在线9| 日韩欧美一区视频在线观看| 十八禁人妻一区二区| 50天的宝宝边吃奶边哭怎么回事| 亚洲国产欧美日韩在线播放| videosex国产| 成年女人毛片免费观看观看9 | 搡老岳熟女国产| 亚洲精华国产精华精| 两个人看的免费小视频| 亚洲精品在线美女| 亚洲av日韩精品久久久久久密| 十分钟在线观看高清视频www| 亚洲自偷自拍图片 自拍| 欧美黑人精品巨大| 欧美精品一区二区免费开放| 丁香六月欧美| 午夜福利视频在线观看免费| 啪啪无遮挡十八禁网站| 久久综合国产亚洲精品| 自线自在国产av| 亚洲欧美精品自产自拍| 伦理电影免费视频| 午夜视频精品福利| 亚洲九九香蕉| 亚洲精品乱久久久久久| 日韩一区二区三区影片| 人妻 亚洲 视频| 后天国语完整版免费观看| netflix在线观看网站| 久久狼人影院| 两性夫妻黄色片| 午夜91福利影院| 精品视频人人做人人爽| 久久九九热精品免费| netflix在线观看网站| 成年动漫av网址| 国产精品成人在线| 欧美日韩国产mv在线观看视频| 男人添女人高潮全过程视频| 18在线观看网站| 美女福利国产在线| 日韩精品免费视频一区二区三区| 91国产中文字幕| 中文字幕av电影在线播放| tube8黄色片| 欧美亚洲 丝袜 人妻 在线| 午夜福利视频精品| av欧美777| 国产欧美日韩综合在线一区二区| 一本大道久久a久久精品| 久久中文看片网| 少妇人妻久久综合中文| 亚洲欧美精品综合一区二区三区| www.av在线官网国产| 成人三级做爰电影| 老汉色∧v一级毛片| 成年美女黄网站色视频大全免费| 搡老乐熟女国产| 精品人妻一区二区三区麻豆| 免费看十八禁软件| 99久久99久久久精品蜜桃| 两个人免费观看高清视频| 视频区图区小说| 亚洲欧美精品综合一区二区三区| 欧美激情极品国产一区二区三区| 国产男人的电影天堂91| 每晚都被弄得嗷嗷叫到高潮| 亚洲七黄色美女视频| 看免费av毛片| 久久精品熟女亚洲av麻豆精品| 麻豆国产av国片精品| 国产精品熟女久久久久浪| 十八禁网站免费在线| 婷婷丁香在线五月| 久久久久久人人人人人| 亚洲av欧美aⅴ国产| 午夜福利视频精品| 在线永久观看黄色视频| 亚洲伊人久久精品综合| 麻豆乱淫一区二区| 91av网站免费观看| 色视频在线一区二区三区| 国产精品麻豆人妻色哟哟久久| 后天国语完整版免费观看| 老司机亚洲免费影院| 十八禁网站免费在线| 欧美另类亚洲清纯唯美| 好男人电影高清在线观看| 视频在线观看一区二区三区| 咕卡用的链子| 十八禁网站免费在线| 亚洲avbb在线观看| 午夜免费成人在线视频| 黄片大片在线免费观看| 免费日韩欧美在线观看| 国产三级黄色录像| 国产高清国产精品国产三级| 波多野结衣av一区二区av| 波多野结衣一区麻豆| 精品福利观看| 欧美日韩亚洲综合一区二区三区_| 人人澡人人妻人| 午夜免费观看性视频| 国产成人免费观看mmmm| 婷婷色av中文字幕| 亚洲国产欧美一区二区综合| 丰满少妇做爰视频| 国产一区二区三区综合在线观看| 午夜成年电影在线免费观看| 日韩欧美国产一区二区入口| 中文欧美无线码| 黄色视频在线播放观看不卡| 亚洲精品一二三| 久久香蕉激情| 国产精品一二三区在线看| 纵有疾风起免费观看全集完整版| 9191精品国产免费久久| 十八禁网站网址无遮挡| 中文字幕最新亚洲高清| 美女中出高潮动态图| 国产成人免费观看mmmm| 女人被躁到高潮嗷嗷叫费观| a在线观看视频网站| 国产精品久久久久久精品电影小说| 亚洲性夜色夜夜综合| 免费一级毛片在线播放高清视频 | 法律面前人人平等表现在哪些方面 | 国产又色又爽无遮挡免| 中文精品一卡2卡3卡4更新| av线在线观看网站| 最黄视频免费看| 另类精品久久| 免费高清在线观看视频在线观看| 老熟妇乱子伦视频在线观看 | 亚洲伊人久久精品综合| 纯流量卡能插随身wifi吗| 香蕉国产在线看| 欧美成人午夜精品| av超薄肉色丝袜交足视频| 99国产精品一区二区三区| 亚洲性夜色夜夜综合| 91精品伊人久久大香线蕉| 十八禁网站免费在线| 欧美久久黑人一区二区| 国产欧美日韩一区二区三区在线| 少妇人妻久久综合中文| 欧美在线黄色| 搡老乐熟女国产| 亚洲中文av在线| 国产在视频线精品| 69av精品久久久久久 | 新久久久久国产一级毛片| 18禁裸乳无遮挡动漫免费视频| av欧美777| 久久ye,这里只有精品| 99精品欧美一区二区三区四区| 91精品国产国语对白视频| 国产av精品麻豆| 黑人操中国人逼视频| 免费高清在线观看日韩| 热re99久久国产66热| 久久精品人人爽人人爽视色| 91精品国产国语对白视频| 亚洲精品国产精品久久久不卡| 啦啦啦中文免费视频观看日本| 日本精品一区二区三区蜜桃| 青青草视频在线视频观看| 欧美黄色片欧美黄色片| 国产日韩一区二区三区精品不卡| 蜜桃在线观看..| 91大片在线观看| 免费在线观看完整版高清| 久久久久久久久免费视频了| 男女床上黄色一级片免费看| 91老司机精品| 91精品三级在线观看| 久久青草综合色| 欧美激情极品国产一区二区三区| 日日夜夜操网爽| 性高湖久久久久久久久免费观看| 国产免费视频播放在线视频| 19禁男女啪啪无遮挡网站| 免费一级毛片在线播放高清视频 | 亚洲成人手机| 国产av精品麻豆| 老司机深夜福利视频在线观看 | 9191精品国产免费久久| 最近中文字幕2019免费版| 夜夜骑夜夜射夜夜干| 一二三四社区在线视频社区8| 老司机福利观看| 亚洲精品久久成人aⅴ小说|